Insecure Channel Configuration in Ansible Tower Allows Data Leak and Denial of Service Attacks

Insecure Channel Configuration in Ansible Tower Allows Data Leak and Denial of Service Attacks

CVE-2018-16879 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Ansible Tower before version 3.3.3 does not set a secure channel as it is using the default insecure configuration channel settings for messaging celery workers from RabbitMQ. This could lead in data leak of sensitive information such as passwords as well as denial of service attacks by deleting projects or inventory files.

Learn more about our Web Application Penetration Testing UK.